System Management. Leif Nixon. a security perspective 1/37
|
|
|
- Claire Boone
- 9 years ago
- Views:
Transcription
1 1/37 System Management a security perspective Leif Nixon
2 2/37 System updates Should we ever update the system? Some common update strategies: 1. If it works, don t touch it! 2. We pick and choose the most important updates. 3. We apply all updates.
3 3/37 System updates Discovering the need to update Watch vendor announcement lists Watch general security lists Be part of a community that can afford to watch more specific resources
4 /37 System updates Triage Do we care? Useful scale: 1. Update later (scheduled or together with more important stuff) 2. Update as soon as we get an update in our preferred format 3. Take care of it right now in one way or another!
5 5/37 System updates Triage Do we care? Caution: Important for the vendor may still mean Critical for you! Most security advisories are not tuned for our environment, with many general shell users. A local root exploit is critical to us!
6 6/37 System updates Updating the triage Generally, things get more broken with time.
7 6/37 System updates Updating the triage Generally, things get more broken with time. Sometimes: lucky breaks in the other direction; Ah, it turns out the bug is only triggered if you use feature X We found this simple workaround
8 7/37 System updates Problems getting updates Waiting for repackagers Example: CentOS Waiting for vendor solutions Example: proprietary filesystem drivers Figuring out stuff built from source at site Example: a lot of big scientific packages
9 8/37 System updates Solutions for getting updates If it hurts, don t do it Limit dependency on turn-key solutions, third-party dependencies as far as possible. Make vendors understand our pain. Again and again. Until they understand. Prepare for building own packages Example: For RHEL/CentOS set up mock environment, do test builds of likely/hard components (kernel, glibc,...)
10 9/37 System updates Solutions for getting updates Document source builds so they can be redone by others Automatic build scripts/systems may help but not if too complicated! Make sure you have the credentials, licenses etc needed to download vendor updates when you need them.
11 0/37 Workarounds Trust, but verify Can we test that it works? Do we trust it? Always remember that even if one particular exploit fails, you may still be vulnerable...
12 11/37 Workarounds Systemtap to the rescue Systemtap is often useful for working around kernel vulnerabilities. Example: to block the CVE vulnerability in the perfmonitor subsystem: probe kernel.function("sys_perf_event_open") printf("sys_perf_event_open DENIED!\n"); $attr_uptr = 0 }
13 12/37 How to deploy updates Updating login nodes and system servers Reboot not needed Updates can often be applied right away. Make sure enough stuff is restarted! Do you know about /usr/bin/needs-restarting? Reboot needed Multiple login servers help. Multiple redundant system servers help too. Otherwise, make sure a quick reboot does not cause user problems (lost jobs, failed file operations,... )
14 13/37 How to deploy updates Updating worker nodes Reboot not needed Updates may be applied right away, but do you care about OS jitter? Can we do work in the job epilog?... are you sure the update persists? (more on this later)
15 14/37 How to deploy updates Updating worker nodes Reboot needed Automate rolling updates (rebooting as soon as current job is done)! Keep users out of nodes they do not run jobs on. Can we accept the risk that users can login to nodes that are not yet updated? If not, shut down user login access to nodes.
16 15/37 No workaround, no update? Decide beforehand when it will be appropriate to shut down access. Get management acceptance for this.
17 15/37 No workaround, no update? Decide beforehand when it will be appropriate to shut down access. Get management acceptance for this. Levels: 1. No new logins accepted, but do not kick out those who are logged in. 2. No logins accepted, logged in users kicked out, jobs keep running. 3. Jobs killed, too.
18 16/37 No workaround, no update? Keep users and management informed! We have temporarily blocked logins while we are investigating how to secure the system against a serious security vulnerability that was released today easily becomes I dunno, I heard they shut down the system because it was hacked or something.
19 17/37 Configuration management A consistent system configuration over nodes and servers is important for security, but also for functionality and performance.
20 18/37 Configuration management Node installation Special consideration for compute nodes: When and how do we (re-)install them? 1. Manually installed node image, use that when booting 2. Scripted install (kickstart etc) for making node image, use that when booting 3. Scripted install when needed, reboot from disk otherwise 4. Scripted install on every boot
21 9/37 Configuration management Node installation Node reinstallation on every reboot: Good: Nodes are always clean. Bad: Nodes already zapped when you want to do forensics.
22 20/37 Configuration management Deployment at scale Letting thousands of servers wget/rsync from a few system servers might not work. Solutions: Bittorrent? Multicast?
23 21/37 Configuration management Keeping things consistent How do we make sure we do not forget vital configuration? 1. Checklists 2. Scripts 3. Configuration management tools Ansible, Cfengine, Chef, Puppet, Quattor,...
24 21/37 Configuration management Keeping things consistent How do we make sure we do not forget vital configuration? 1. Checklists 2. Scripts 3. Configuration management tools Ansible, Cfengine, Chef, Puppet, Quattor,... Warning: Abstracting too much may make system administration harder. Strive for the right balance!
25 22/37 Configuration management Keeping things consistent Then add version control on top of this. Now, you also know how it was four months ago! Log your actions. Still useful, even with configuration management tools (but may partly be the commit log). May be as simple as a date-ordered text file on the system server.
26 23/37 Configuration management Keeping things consistent Package your own tools, scripts etc. Example: Instead of some slightly different scripts in /root/bin on four clusters, we might aim for versioned RPM package on internal repo server, with source in git.
27 23/37 Configuration management Keeping things consistent Package your own tools, scripts etc. Example: Instead of some slightly different scripts in /root/bin on four clusters, we might aim for versioned RPM package on internal repo server, with source in git. But again, don t overdo this...
28 24/37 Configuration management Node health checking Running health checking scripts in prolog/epilog might not be all that security related, but it saves a lot of other trouble... We can add test for security problem X fixed if we want.
29 25/37 Compartmentalization The waterfall model of trust Be aware of the direction of the trust flow. For example: OK: desktop system server compute node OK: desktop system server login node
30 5/37 Compartmentalization The waterfall model of trust Be aware of the direction of the trust flow. For example: OK: desktop system server compute node OK: desktop system server login node Bad: desktop login node system server Bad: login node console infrastructure server
31 6/37 Compartmentalization The waterfall model of trust Explain reasoning to all system staff. Yes, it may be inconvenient at times. Yes, it may save your cluster one day. Enforce using account filters, firewalls, etc.
32 27/37 Compartmentalization Separate servers Users should only have access to the login nodes and, possibly, their allocated worker nodes. Keep system servers separate from login nodes. On large systems, separate system servers more if possible. Example: File servers may require kernel versions with known local root exploits for weeks or forever. Restrict access to them!
33 28/37 Compartmentalization Separate credentials Do not use the same password or similar for different levels in the waterfall. Do not use the same root password on different clusters. Goal: Nothing you can steal at a lower level should gain you access at a higher level. But it s hard to fully reach this.
34 29/37 Compartmentalization Separate credentials Example: Only staff can login to system servers. Good. But staff homedirs are mounted on login nodes and compute nodes. If you get root on them, you can become a staff member, change.profile, get to run code on system server (or boobytrap ssh, su,... )
35 30/37 Compartmentalization Separate credentials Be careful with single sign-on! Example: Library password LiU password Personal certificate Supercomputer access!
36 31/37 Hardening There are a lot of things we can do. Some may conflict with ease-of-use, some not.
37 32/37 Hardening suid stripping Example: NSC antisuid runs from cron Whitelist of known binaries that are allowed to be setuid root ping, sudo... Blacklist of known binaries that should have their suid bit stripped mount... Any other suid binaries found? Sound the alarm!
38 33/37 Hardening File system flags Whenever possible, mount file systems: read-only nosuid, nodev root squash norelatime performance vs. forensic abilities
39 34/37 Hardening Module loading Many kernel exploits depend on being able to load some obscure module. Questions to consider: Can we turn off module loading completely? Can we at least turn off autoloading of modules?
40 35/37 Hardening Security frameworks SELinux, grsecurity... NSC doesn t do this. Any success stories? Introducing third-party dependencies may make updating harder.
41 36/37 Hardening Help the users proactively Examples of things you can do periodically: Check for really bad filesystem permissions Check for bad SSH usage Unencrypted private keys Known bad keys in authorized_keys (remember the Debian Debacle?)
42 7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection...
43 7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection so here comes another 40 slides!
44 7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection just kidding!
45 7/37 And much, much more... We still haven t covered things like log management, log analysis, intrusion detection just kidding! Questions? Opinions? Protests?
TestOps: Continuous Integration when infrastructure is the product. Barry Jaspan Senior Architect, Acquia Inc.
TestOps: Continuous Integration when infrastructure is the product Barry Jaspan Senior Architect, Acquia Inc. This talk is about the hard parts. Rainbows and ponies have left the building. Intro to Continuous
Do it Yourself System Administration
Do it Yourself System Administration Due to a heavy call volume, we are unable to answer your call at this time. Please remain on the line as calls will be answered in the order they were received. We
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
How To Run A Linux Agent On Alandesk (For Free) On A Linux Server (For A Non-Free) On Your Ubuntu Computer (For Cheap) On An Ubuntu 2.5 (For Ubuntu) On Linux
LANDesk Management Suite 8.8 SP3 Best Known Method for Managing Linux Agents Contents Introduction... 4 Scope... 4 Assumptions... 4 Supported Linux Platforms... 4 Prerequisite Software... 4 The Linux Agent
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
ESX 4 Patch Management Guide ESX 4.0
ESX 4 Patch Management Guide ESX 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Installing an IBM Workplace/Portal Server on Linux
Installing an IBM Workplace/Portal Server on Linux Auteur Roel Broersma Versie 1.0 Page 1 of 9 Installing an IBM Workplace/Portal Server on Linux... 1 1. Introduction... 3 2. Installing CentOS... 4 3.
3.14. 3.14 Training on Linux System Administration, LPI Certification Level 1
165 3.14 Training on Linux System Administration, LPI Certification Level 1 Name of the Tool: Source: Usage: Description: GIZ This training has been designed for IT experts and institutions desired to
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator
Operating System Security Hardening for SAP HANA
Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance [email protected] Markus Gürtler Architect & Technical Manager SAP Linux Lab [email protected] Corporate
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
HP PolyServe Software 4.1.0 upgrade guide
HP StorageWorks HP PolyServe Software 4.1.0 upgrade guide This document describes how to upgrade to HP PolyServe Matrix Server 4.1.0, HP PolyServe Software for Microsoft SQL Server 4.1.0, and HP PolyServe
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
How to Use? SKALICLOUD DEMO
How to Use? SKALICLOUD DEMO Account Login Page SkaliCloud Control Panel Overview Step 1: Click Add and Select Server Button to create your Server, add your Drive, Private Vlan or Static IP You are now
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
ovirt self-hosted engine seamless deployment
ovirt self-hosted engine seamless deployment Simone Tiraboschi Software Engineer Red Hat Agenda ovirt Hosted Engine Current - 3.5 - HE deploy flow Enabling technologies New - 3.6 - deploy flow Comparison
IBRIX Fusion 3.1 Release Notes
Release Date April 2009 Version IBRIX Fusion Version 3.1 Release 46 Compatibility New Features Version 3.1 CLI Changes RHEL 5 Update 3 is supported for Segment Servers and IBRIX Clients RHEL 5 Update 2
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Using Virtual Machines
Using Virtual Machines We will use VMs in CIT 130 so that you can access both a Windows 7 and a Linux machine. You will be able to access these from on and off campus (off campus access will require that
Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
Vulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.
IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Aqua Connect Load Balancer User Manual (Linux)
Aqua Connect Load Balancer User Manual (Linux) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Mac OS X ACRDS Server Computer Node Setup... 5 Managing Inactive Sessions...
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter 2011 6th December 2011
Hardened Hosting Quintin Russ OWASP New Zealand Chapter 2011 6th December 2011 1 About Me Quintin Russ Technical Director, SiteHost http://www.sitehost.co.nz [email protected] Web Developer in previous
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
OBSERVEIT 6.0 WHAT S NEW
OBSERVEIT 6.0 WHAT S NEW ObserveIT 6.0 extends ObserveIT s industry leading session recording solution to a complete Insider Threat Platform that detects and mitigates the risk of insider threats across
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
MarkLogic Server. Installation Guide for All Platforms. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Installation Guide for All Platforms 1 MarkLogic 8 February, 2015 Last Revised: 8.0-4, November, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Installation
Plexxi Control Installation Guide Release 2.1.0
Plexxi Control Installation Guide Release 2.1.0 702-20002-10 Rev 1.2 February 19, 2015 100 Innovative Way - Suite 3322 Nashua, NH 03062 Tel. +1.888.630.PLEX (7539) www.plexxi.com Notices The information
Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.
Remote Desktop How-To How to log into your computer remotely using Windows XP, etc. Overview How XP Remote Desktop works, its features Unattended usage, drag n drop between computers How to set it all
Prepared for: How to Become Cloud Backup Provider
Prepared for: How to Become Cloud Backup Provider Contents Abstract... 3 Introduction... 3 Purpose... 3 Architecture... 4 Result... 4 Requirements... 5 OS... 5 Sizing... 5 Third-party software requirements...
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Recommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Work Environment. David Tur HPC Expert. HPC Users Training September, 18th 2015
Work Environment David Tur HPC Expert HPC Users Training September, 18th 2015 1. Atlas Cluster: Accessing and using resources 2. Software Overview 3. Job Scheduler 1. Accessing Resources DIPC technicians
Installing an OS on a Server
Installing an OS on a Server This chapter includes the following sections: OS Installation Methods, page 1 Installation Targets, page 2 Installing an OS Using a PXE Installation Server, page 3 Installing
depl Documentation Release 0.0.1 depl contributors
depl Documentation Release 0.0.1 depl contributors December 19, 2013 Contents 1 Why depl and not ansible, puppet, chef, docker or vagrant? 3 2 Blog Posts talking about depl 5 3 Docs 7 3.1 Installation
10 Ways to Not Get Caught Hacking On Your Mac
10 Ways to Not Get Caught Hacking On Your Mac Three18 is a Comprehensive Technology Solutions Provider Apple Certified Partner Microsoft Gold Partner Symantec Security Solutions Partner Novell and RedHat
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Continuous Integration in the Cloud with Hudson
Continuous Integration in the Cloud with Hudson Kohsuke Kawaguchi Jesse Glick Sun Microsystems, Inc. Hudson committers Rise of Continuous Integration Offload from people, push to computers $ computers
CUIT UNIX Standard Operating Environment and Security Best Practices
Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT
I N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Hadoop Data Warehouse Manual
Ruben Vervaeke & Jonas Lesy 1 Hadoop Data Warehouse Manual To start off, we d like to advise you to read the thesis written about this project before applying any changes to the setup! The thesis can be
Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
SUSE LINUX Enterprise Server for SGI Altix Systems
SUSE LINUX Enterprise Server for SGI Altix Systems 007 4651 002 COPYRIGHT 2004, Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein.
Automated Deployment of Oracle RAC Using Enterprise Manager Provisioning Pack
Automated Deployment of Oracle RAC Using Enterprise Manager Provisioning Pack By Kai Yu As a part of the Oracle Enterprise Manager s lifecycle management solutions, the Oracle Enterprise Manager Provisioning
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Server Configuration and Deployment (part 1) Lotus Foundations Essentials
Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP With migrating to a new version of CRM, one of the side-affects is that the Outlook Integration Client has also been updated and needs to be
Integration Module for BMC Remedy Helpdesk
EMC VoyenceControl Integration Module version 4.0.1 BMC REMEDY HELPDESK P/N 300-007-481 REV A01 EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com COPYRIGHT Copyright
Comodo One Software Version 1.8
rat Comodo One Software Version 1.8 Patch Management Module Administrator Guide Guide Version 1.8.100915 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Hadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Unit 4: Hadoop Administration An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government Users Restricted
Why Choose Oz Servers. Dedicated Hosting. Performance Meets Value at Oz Servers
Why Choose Oz Servers With a proven history of first class service and reliability over the last 10 years, Oz Servers is your first choice in dedicated and virtual hosting. 24x7 network support and maintenance
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
RHCSA 7RHCE Red Haf Linux Certification Practice
RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in
Ubuntu Linux Reza Ghaffaripour May 2008
Ubuntu Linux Reza Ghaffaripour May 2008 Table of Contents What is Ubuntu... 3 How to get Ubuntu... 3 Ubuntu Features... 3 Linux Advantages... 4 Cost... 4 Security... 4 Choice... 4 Software... 4 Hardware...
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Installing and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
The Defense RESTs: Automation and APIs for Improving Security
The Defense RESTs: Automation and APIs for Improving Security Want to get better at security? Improve your operations and your development practices. The key is to centralize management, automate and test.
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
Install guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
The Paraná Digital Project
Marcos Castilho Center for Scientific Computing and Free Software C3SL/UFPR September, 25th 2008 Managing a Grid of Computer Laboratories for Educational Purposes Abstract We present a grid-based model
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
SERVER HARDENING. Presented by: Daniel Waymel and Corrin Thompson at TexSAW 2014 at the University of Texas at Dallas
SERVER HARDENING Presented by: Daniel Waymel and Corrin Thompson at TexSAW 2014 at the University of Texas at Dallas OUTLINE Intro Securing Your Access Restricting Unwanted Access Monitoring and Alerts
Windows 8 Backup, Restore & Recovery By John Allen
Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot
